cc to relevant maintainers.
If needed, add my name and contact info into the maintainer's list.
Signed-off-by: Zero Tang
---
hw/misc/Kconfig | 5
hw/misc/meson.build | 1 +
hw/mi
gards,
Zero Tang
On Tue, Aug 6, 2024 at 5:28 PM Zero Tang wrote:
> This virtual PCILeech device aims to help security researchers attack the
> guest via DMA and test their IOMMU defenses.
> This device is intended to support any systems with PCI, but I am only
> able to test x86-based g
I'd like to *PING* this patch once again. Please review this patch. If
there is anything missing or ambiguous in the patch, please let me know.
Thanks,
Zero Tang
On Sun, Aug 18, 2024 at 1:30 AM Zero Tang wrote:
> Hello,
>
> I'd like to ping this patch in that the QEMU-PCI
ve this device will enable security researchers
and etc. to use DMA attacks and IOMMU defenses more easily with
QEMU at zero cost.
If you have further comments and/or questions please let me know.
Thanks,
Zero Tang
On Thu, Aug 29, 2024 at 8:13 PM Peter Maydell
wrote:
> On Tue, 6 Aug 202
This virtual PCI device is intended for security researchers to attack the
guest via DMA.
This is my first-time contribution and I hope I am doing things correctly.
Signed-off-by: Zero Tang
---
hw/misc/Kconfig | 5 +
hw/misc/meson.build | 1 +
hw/misc/pcileech.c | 283
lting in a #DF
exception; the #PF would trigger for the third time, resulting in
triple-fault, and eventually causes the shutdown VM-Exit to the
bluepill hypervisor right after it boots.
In summary, this patch replaces "long" with "int64_t" in order to enforce
the canonicaliza